On Mon, Feb 13, 2012 at 1:49 PM, Steve Bennett <ste...@workware.net.au>wrote:
> Joe Mistachkin has recently added support for calling TH1 scripts on > certain actions. > See http://www.fossil-scm.org/index.html/info/0b61e3c019 > > In the jimtcl branch, TH1 is replaced with Jim Tcl, so any of these > scripts has the full power of Jim Tcl, including exec. > > This sounds a whole lot like mobile code. I was left wondering: would it be enough to do a 'fossil clone <something>' to download a malware script onto my system? How is this capability secured? -- Gé
_______________________________________________ fossil-users mailing list fossil-users@lists.fossil-scm.org http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users